Just Fix It Blog
Sustainability at Just Fix It: Hosting with Equinix for a Greener Future
At JFX Hosted powered by Just Fix It , we prioritize sustainability by hosting our servers in Equinix facilities, which are enhancing their environmental sustainability. Equinix has announced a major step by transitioning their data centers' operating temperature and...
Importance of IT Security in a Poetic form
In cyberspace, where all is code, The winds of danger often blow. From hackers lurking in the night, To malware ready to take a bite. But fear not, dear reader, for I bring A tale of how to protect your thing. Your data, files, and passwords too, Can all be safe, with...
Track your IT Hardware Assets like an expert and Organize IT Equipment
When you have a preferred way of working, arranging the things you see around you will certainly make you feel more productive. The challenge in business comes with organizing the things you don’t see very often. With employees working outside the office, there are an...
Striking a Balance with your Screen Time
Limiting your Social Media Screen time and Excessive Device Usage Most of our life revolves around a phone or computer screen. As summer comes, instead of seeking new adventures, many Canadians are settling for online games, social media and new series to binge watch....
Paquette Travers Law Office – Private Cloud Flexibility During COVID
Meeting real estate client needs by adopting clean lean technology services. Despite COVID, the real estate market in SW Ontario has not slowed down at all. With all the paperwork and additional distancing steps to keep clients and staff safe, the real estate lawyers...
Why are computer updates so painful?
Are Software Updates Necessary? From the antivirus that slows your “work from home” boot up every morning, to the smartphone lags that force you into an update, software seems so needy. You are not alone wondering if you have time for that coffee when your update says...
Aboud & Associates – Faster connectivity for Remote Workers
Landscape Architecture Company in Guelph ON – Migrating servers to JFx Private Cloud for added speed and security Designers at a landscape architecture firm are heavily reliant on large imaging and mapping files to do their job. Different phases of a project can...
Tune Up Your WiFi Network
Once the world got a taste of the internet, expanding the internet experience by making it more accessible in homes, workspaces and public spaces was the next logical step. Today, we use WiFi with a growing array of devices, such as smart TVs, printers, smart...
Control the Information You Share On a Zoom or Teams Videoconference Call
For a reason that we all know all too well (a certain virus that shall not be named . . .), in the business world communicating with customers and colleagues from home via videoconferencing software is all the rage these days. Given the present circumstances, the...
Disaster Recovery: IT Business Continuity Planning
With the shift of working habits due to the COVID-19 pandemic and many workers using remote access to work from home, businesses are more reliant than ever on servers and virtual private networks (VPNs). This change of pace has its benefits – it is the perfect...
Cyber Insurance: A Must-Have when Ransomware is on the Rise
Cybercrime—a steadily rising threat Whether you are a large organization, or a small- or medium-sized business, cybercriminals—with fingertips perched atop their keyboards—are poised to hack into your data with malicious intent. Mainstream as it now is, the Internet...
Free Yourself of Constraining Offices: Use Cloud-Based Infrastructure
If there’s one thing businesses have learned in the wake of COVID-19, it’s the benefit of having flexibility in critical infrastructure services. Working from “the home office” has been life or death for businesses during isolation; some companies that relied on...
Block 99.9% of Account Hacks with Two-Factor Authentication
Two-factor authentication is an increasingly popular way to prevent forced login attempts from non-employees. It works by establishing a second “gate” of entry you must pass through to reach the valuable information stored on the other side; often times by sending a...
Ransomware as a Service: What is it and How to Protect Your Business
Once upon a time, to infect someone’s computer with a worm or a virus, you’d have to code it yourself then figure how to actually get it onto someone’s system. Oh sure, since the internet’s dark days, instructions on how to assemble everything from a spambot to a...
Brute Force Attacks: Password Strength Matters
While movies frequently portray the hacker as a command-line cowboy, fingers flying across the keyboard as they work their computer magic against whatever foe they’re facing, hacking in reality is much more mundane. Directed attacks against specific entities are rare,...
Electronics Recycling: 3 Ways to Recycle Electronics
With the amount electronic upgrades increasing worldwide each year, properly disposing of electronic waste (e-waste) is becoming even more important. Whether upgrading a computer, gaming system, television or smartphone, ensure your business or household is not...
MARK 57 – THE RETURN OF FIREFOX
I love Mozilla Firefox, even if I stopped using it. When I first transferred to it back in the early 2000’s, it felt like being part of a secret club; a resistance against Microsoft and their Internet Explorer. I even carried around a copy on a USB thumb drive so that...
THE WPA2 KRACK
Without looking, can you tell me what security protocol your wi-fi is using? I can, but that’s because I’m a gigantic nerd; I’ve got the standard WPA2 encryption whizzing through my apartment. If you’ve recently installed a router or received a modem with built-in...